DocumentCode :
2571367
Title :
Ensuring tight computational security against higher-order DPA attacks
Author :
Khurana, Dakshita ; Gaurav, Aditya
Author_Institution :
Dept. of Electr. Eng., Indian Inst. of Technol.- Delhi, New Delhi, India
fYear :
2011
fDate :
19-21 July 2011
Firstpage :
96
Lastpage :
101
Abstract :
While DES has been proven to be breakable within a day given sufficient computational power, AES is still in use because it is extremely resistant to cryptanalytic attacks. Power Analytic Attacks use power consumption traces of the hardware or software implementation of these algorithms to reduce search space exponentially in the size of the key, thereby making computational complexity several orders of magnitude lower. This paper analyzes the increase in the computational advantage of an adversary who uses DPA and higher order power analysis attacks as opposed to algorithmic cryptanalysis. We highlight why there can be no perfect masking against DPA, and then define a standard for the security of masking countermeasures to such attacks. The main contribution is a security metric for systems and a cut-off for the number of encryptions allowable for a given order of masking to make the system immune to higher order DPA attacks.
Keywords :
computational complexity; cryptography; search problems; algorithmic cryptanalysis; computational complexity; computational security; cryptanalytic attack; differential power analysis; higher order power analysis attack; higher-order DPA attack; masking countermeasure; power analytic attack; power consumption trace; search space; security metric; Algorithm design and analysis; Complexity theory; Correlation; Cryptography; Hamming weight; Noise; complexity of power analysis attacks; computational security; higher-order Differential Power Analysis (HO-DPA); higher-order masking; security metric;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Privacy, Security and Trust (PST), 2011 Ninth Annual International Conference on
Conference_Location :
Montreal, QC
Print_ISBN :
978-1-4577-0582-3
Type :
conf
DOI :
10.1109/PST.2011.5971970
Filename :
5971970
Link To Document :
بازگشت